The Experts below are selected from a list of 3729 Experts worldwide ranked by ideXlab platform
Balamurugan Balusamy - One of the best experts on this subject based on the ideXlab platform.
-
an intelligent approach for uav and drone privacy security using blockchain methodology
International Conference on Cloud Computing, 2019Co-Authors: Tarun Rana, Achyut Shankar, Mohd Kamran Sultan, Rizwan Patan, Balamurugan BalusamyAbstract:In today’s era drones and UAV are being used more and more for spying and warfare. Their excessive use makes them vulnerable to be hacked and used for malicious purposes. There are also security loopholes in this technology like the radio waves which can be exploited by the rivals and can cause a large amount of destruction or loss of data. This paper is written to improve the security of UAV and drones by using blockchain technology. Blockchain is a highly secured technology as it uses Private Key Cryptography and peer to peer network. By incorporating this technology in transmitting signals from controller to drone or UAV, we can achieve an extra amount of security in transmitting of signals also it increases the connectivity.
Shudhanshu Yadav - One of the best experts on this subject based on the ideXlab platform.
-
Function Codes for Protection of Key in Private Key Cryptography
2017Co-Authors: Ashish Agarwal, Neha Tyagi, Anurag Katiyar, Shubham Garg, Shudhanshu YadavAbstract:In order to check the applicability and correctness of any designed algorithm, it is must to write a code on any suitable platform that successfully implements the logic. The present work is actually an extension to what we have done in our previous works where we have tried to devise an algorithm which is based on the most popular and largely applied asymmetric Key algorithm named RSA algorithm [1]. The basic idea of latter is not touched but modified only with a piece of further enhancement in its working. The flexibility of RSA algorithm to wide range of values has instigated us to choose it for our efforts to ensure secure communication between communicating parties with the probability of getting failed minimised to great level of its implementation
Tarun Rana - One of the best experts on this subject based on the ideXlab platform.
-
an intelligent approach for uav and drone privacy security using blockchain methodology
International Conference on Cloud Computing, 2019Co-Authors: Tarun Rana, Achyut Shankar, Mohd Kamran Sultan, Rizwan Patan, Balamurugan BalusamyAbstract:In today’s era drones and UAV are being used more and more for spying and warfare. Their excessive use makes them vulnerable to be hacked and used for malicious purposes. There are also security loopholes in this technology like the radio waves which can be exploited by the rivals and can cause a large amount of destruction or loss of data. This paper is written to improve the security of UAV and drones by using blockchain technology. Blockchain is a highly secured technology as it uses Private Key Cryptography and peer to peer network. By incorporating this technology in transmitting signals from controller to drone or UAV, we can achieve an extra amount of security in transmitting of signals also it increases the connectivity.
Saeed Q Y Alkhalidi - One of the best experts on this subject based on the ideXlab platform.
-
hybrid encryption decryption technique using new public Key and symmetric Key algorithm
International Journal of Information and Computer Security, 2014Co-Authors: Prakash Kuppuswamy, Saeed Q Y AlkhalidiAbstract:This research study proposes hybrid encryption system using new public Key algorithm and Private Key algorithm. A hybrid cryptosystem is one which combines the convenience of a public-Key cryptosystem with the efficiency of a symmetric-Key cryptosystem. Here, we propose a provably two way secured data encryption system, which addresses the concerns of user's privacy, authentication and accuracy. This system has two different encryption algorithms which have been used both in the encryption and decryption sequence. One is public Key Cryptography based on linear block cipher another one is Private Key Cryptography based on simple symmetric algorithm. This Cryptography algorithm provides more security as well as authentication comparing to other existing hybrid algorithm.
Ashish Agarwal - One of the best experts on this subject based on the ideXlab platform.
-
Function Codes for Protection of Key in Private Key Cryptography
2017Co-Authors: Ashish Agarwal, Neha Tyagi, Anurag Katiyar, Shubham Garg, Shudhanshu YadavAbstract:In order to check the applicability and correctness of any designed algorithm, it is must to write a code on any suitable platform that successfully implements the logic. The present work is actually an extension to what we have done in our previous works where we have tried to devise an algorithm which is based on the most popular and largely applied asymmetric Key algorithm named RSA algorithm [1]. The basic idea of latter is not touched but modified only with a piece of further enhancement in its working. The flexibility of RSA algorithm to wide range of values has instigated us to choose it for our efforts to ensure secure communication between communicating parties with the probability of getting failed minimised to great level of its implementation